What Is a Common Method for Sybil Resistance besides Quadratic Voting in DAOs?

A common method is the use of non-transferable, soulbound tokens (SBTs) or verifiable credentials tied to unique real-world identities. This attempts to link one on-chain identity to one unique person, making it harder for one entity to control multiple wallets for voting.

Another approach involves proof-of-humanity systems that use social graphs or biometric verification, though these often raise privacy concerns.

What Are the Characteristics of a ‘Non-Transferable’ or ‘Soulbound’ Token?
What Are the Trade-Offs of Using Quadratic Voting for Proposal Funding versus Simple Majority Voting?
What Is a Sybil Attack and How Does Quadratic Voting Mitigate It?
Why Is Identity Verification a Challenge for Decentralized Sybil Resistance?
How Does PoS Achieve Sybil Resistance?
What Is the Role of “Decentralized Autonomous Organizations” (DAOs) in Preventing Token Concentration?
How Is Quadratic Funding Different from Quadratic Voting?
How Is the Concept of ‘Vote Buying’ Addressed in Decentralized Governance Models?

Glossar